Enhanced Audio Cryptosystem Using Multiple Secret Keys and Permutations in Time and Transform Domains | ||||
Menoufia Journal of Electronic Engineering Research | ||||
Article 5, Volume 25, Issue 2, July 2016, Page 191-212 | ||||
Document Type: Original Article | ||||
DOI: 10.21608/mjeer.2016.64096 | ||||
View on SCiNiTO | ||||
Authors | ||||
Mahmoud Farouk1; Osama S. Faragallah2; Osama A. Elshakankiry3; Ahmed Elmhalaway1; Hala S. El-sayed4 | ||||
1Dept. of Computer Science and Eng., Faculty of Elect., Eng., Menoufia University | ||||
2Dept. of Computer Science and Eng., Faculty of Elect., Eng., Menoufia University 2 Dept. of Information Technology, College of Computers and Information Dept. of Computer Science and Eng., Faculty of Elect., Eng., Menoufia University 2 Dept. of Information Technology, College of Computers and Information | ||||
3Dept. of Computer Science and Eng., Faculty of Elect., Eng., Menoufia University 2 Dept. of Information Technology, College of Computers and Information Technology, Taif University, Al-Hawiya 21974, Kingdom of Saudi Arabia. | ||||
4Dept. of Electrical Engineering, Faculty of Engineering, Menoufia University. | ||||
Abstract | ||||
This paper presents an enhanced audio speech cryptosystem based on three enhancements for permutation and substitution of speech segments using multiple secret keys and permutations in time and transform domains. The first enhancement method is based on repeating the first and last permutation steps in both encryption/decryption procedures for several times to enhance the security level. The second and third enhancement methods are based on adding two additional secret keys generated from the original key besides the utilized three keys. This adds another security layer for the modified developed audio cryptosystem. Simulation experiments demonstrated that these modifications enhance the security level and quality for the audio cryptosystem compared with a recent audio cryptosystem. | ||||
References | ||||
0px; "> [1] National Bureau of Standards, "Data Encryption Standard", Federal Information Processing Standards Publication no.46, U.S. Government Printing Office, Washington, DC (1977). [2] Anoop, "Public Key Cryptography-Applications algorithm and mathematical explanations", 2007. [3] T. Thongpon and K. Sinchai, "Accelerating Asymmetric-key Cryptography using Parallel-key Cryptographic Algorithm (PCA)", 6th International Conference on computer and Information Technology, vol. 2, pp. 812 – 815, 2009. [4] J. Fridrich, "Symmetric Ciphers Based on Two-dimensional Chaotic Maps," Int.J. Bifurcation and Chaos, vol. 8, no. 6, pp. 1259–1284, 1998. [5] Mosa, E., et al. "Encryption of speech signal with multiple secret keys in time and transform domains." International Journal of Speech Technology 13.4 (2010): 231-242. [6] "Advanced Encryption System", Federal Information Processing Standards Publication 197, 2001. [7] J. Daemen and V. R. Rijndael, "The advanced encryption standard", Dr. Dobb’s J. vol. 26, no. 3, pp. 137–139, 2001. [8] Fu, Chong, et al. "An efficient and secure medical image protection scheme based on chaotic maps." Computers in biology and medicine 43.8 (2013): 1000-1010. [9] Elshamy, Ahmed M., et al. "Optical image encryption based on chaotic baker map and double random phase encoding." Journal of Lightwave Technology 31.15 (2013): 2533-2539. ; "> [10] Elgazar, Safaa, et al. "Efficient Watermarking of Audio Signals." Digital Signal Processing 5.12 (2013): 412. [11] Elshamy, Ahmed M., et al. "Optical image encryption based on chaotic baker map and double random phase encoding." Journal of Lightwave Technology 31.15 (2013): 2533-2539. [12] Y. Zhai, S. Lin and Q. Zhang, "Improving Image Encryption Using Multi-Chaotic Map", Workshop on Power Electronics and Intelligent Transportation System, 2008. PEITS '08, pp. 143 – 148, 2-3 August, 2008. [13] Nassar, S. S., et al. "Multi-level Security Technique Using Steganography with Chaotic Encryption." Digital Image Processing 6.3 (2014): 142-148. [14] Chen, Jun-Xin, et al. "Cryptanalysis and improvement of an optical image encryption scheme using a chaotic Baker map and double random phase encoding." Journal of Optics 16.12 (2014): 125403. [15] Wang, Xingyuan, and Dapeng Luan. "A novel image encryption algorithm using chaos and reversible cellular automata." Communications in Nonlinear Science and Numerical Simulation 18.11 (2013): 3075-3085. [16] Elhoseny, Heba M., et al. "Chaotic encryption of images in the fractional Fourier transform domain using different modes of operation." Signal, Image and Video Processing (2013): 1-12. [17] G. Manjunath and G. V. Anand, "Speech encryption using circulant transformations, " Proc. IEEE, Int. Conf. Multimedia and Exp, Vol. 1, pp. 553-556, August, 2002. [18] P. Hedelin, F. Norden, F and J. Skoglund, "SD optimization of spectral coders", IEEE Workshop on Speech Coding Proceedings, pp. 28 – 30, 1999. [19] S. Wang, A. Sekey, A. Gersho, "An objective measure for predicting subjective quality of speech coders", IEEE Journal on selected areas in communication, Vol. 10, No. 5, pp. 819-829, June 1992. [20] W. Yang, M. Benbouchta, R. Yantorno, "Performance of the modified bark spectral distortion as an objective speech quality measure", Proc. IEEE International Conference on Acoustic, Speech and Signal Processing, Vol. 1, Washington, USA , pp. 541-544. May 1998. [21] W. K. Sang, G. K. Young and M. K. Simon, "Generalized selection combining based on the log-likelihood ratio", IEEE International Conference on Communications ICC 2003, vol. 4, pp. 2789-2794, 2003. [22] J. K. Kwon, S. Park, D. K. Sung, "Collision mitigation by loglikelihood ratio (LLR) conversion in orthogonal code-hopping | ||||
Statistics Article View: 120 |
||||